Accepted Papers of IWDCF 2017

 

Part IDigital Forensics, Public and System Security

 

 

Authors

Title

Conf. Paper No.

1

Qing Ye, Mingxing Hu, Guangxuan Chen, Panke Qin

An Improved Encryption Scheme for Traitor Tracing from Lattice

37

2

Jin Du, Feng Yuan, Liping Ding, Xuehua Liu, Guangxuan Chen,

Research on threat information network based on link prediction

42

3

You Li, Min Long, Fei Peng

Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-node of AVL Tree

50

4

Jianying Xiong, Min Tu

Risking Assessment of Illegal Fund Raising for P2P lending via Similarity Weight

8

5

Xianda Wu, Wei Jiang, Xiang Cui, Chaoge Liu

A Highly Efficient Remote Access Trojan Detection Method

16

6

Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen,

General Construction for Extended Visual Cryptography Scheme Using QR Codes

19

7

Panke Qin, Jingru Wu, Guangxuan Chen, Xudong Li, Yongli Tang

Bilateral-recursive Region Re-routing Signaling Crankback Scheme in Optical Networks for Real-time Information Warfare

24

8

Min Tu, Shiyang Xu, Mingwei Chen, Jianfeng Xu

Research on public transportation system evaluation model based on Fuzzy cloud mode

28

9

Xuehua Liu, Feng Yuan, Liping Ding, Jun Ma

Research of Register Pressure Aware Loop Optimizations for Compiler

36

10

Zhang Xuan, K. P. Chow

A Framework for Dark Web Threat Intelligence Analysis

49

11

Yuning Song, Feng Yuan, Liping Ding

Survey of differential privacy in graph data

52

12

Guangxuan Chen, Junchao Fang, Liping Ding, Panke Qin, Jin Du

A Proposed Secure Trust Strategy for Cross Domain Federation in Cloud

38

13

Cong Zhang, Kaiming Liu, Lidong Zhai, Fan Wu, Hui Lu

Analysis of WeChat Subscription Influence based on Topic Diffusion

18

14

Xiaoxi Liu, Ju Liu, Lingchen Gu,

Keyframe-Based Vehicle Surveillance Video Retrieval with Deep Feature

27

 

 

Part IIContent Forensics and Multimedia Security

 

 

Authors

Title

Conf. Paper No.

1

Zichi Wang, Zhaoxia Yin, Xinpeng Zhang

Asymmetric Distortion Function for JPEG Steganography using Block Artifact Compensation

2

2

Jie Zhu, Xianfeng Zhao, Qingxiao Guan, Gong Chen

Detecting and Distinguishing Adaptive and Non-adaptive Steganography by Image Segmentation

53

3

Xiaojuan Dong, Weiming Zhang, Xianjun Hu, Keyang Liu

A Cloud-User Watermarking Protocol: Protecting the Right to Be Forgotten for the Outsourced Plain Images

4

4

Ruxin Wang, Wei Lu, Shijun Xiang, Xianfeng Zhao, Jinwei Wang

Digital image splicing detection based on Markov features in QDCT and QWT domain

7

5

Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen

Steganalysis of AMR Based on Statistical Features of Pitch Delay

21

6

Fei Peng, Shuai-Ping Wang, Min Long

Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling

46

7

Lu Liu, Yao Zhao, Rongrong Ni

Copy-move Forgery Localization Using Convolutional Neural Networks and CFA Features

51

8

Yuanxin Wu, Wen Diao, Dongdong Hou, Weiming Zhang, Nenghai Yu

Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation

6

9

Sani Abdullahi, Hongxia Wang, Asad Malik

Fingerprint Image Hashing Based on Minutiae Points and Shape Context

12

10

Dan Huang, Fangjun Huang

Reversible Data Hiding based on Adaptive Block Selection Strategy

25

11

Bin Li, Hu Luo, Haoxin Zhang, Shunquan Tan, Zhongzhou Ji

A Multi-branch Convolutional Neural Network for Detecting Double JPEG compression

29

12

Ping Zhong, Mengdi Li, Juan Wen, Yiming Xue

Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine

33

13

Asad Malik, Hongxia Wang, Han-Zhou Wu, Sani Abdullahi

Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image

41

14

Jian Li, Jinwei Wang, Shuang Yu

A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation

44

15

Bin Ma, Yun Qing Shi

A New Kind of High Capacity Reversible Data Hiding Method

32

16

Zhenxing Qian, Zichi Wang, Xinpeng Zhang,  Guorui Feng

Breaking Steganography: Active Attack Based on Modification

23

17

Anjie Peng, Gao Yu, Qiong Zhang, Xiangui Kang

A Universal Image Forensics of Smoothing Filtering

43